

MBA-INFORMATION-TECHNOLOGY-BUSINESS-MANAGEMENT-SCIT in Information Security Management at Symbiosis International University (SIU)


Pune, Maharashtra
.png&w=1920&q=75)
About the Specialization
What is Information Security Management at Symbiosis International University (SIU) Pune?
This Information Security Management program at Symbiosis Centre for Information Technology (SCIT) focuses on equipping future leaders with the strategic and technical expertise required to manage and secure information assets. In India''''s rapidly digitizing economy, cybersecurity professionals are in high demand to combat evolving threats, making this specialization crucial for national digital resilience and economic stability and fostering innovation securely.
Who Should Apply?
This program is ideal for engineering graduates, particularly those with an IT background, seeking entry into the cybersecurity domain at a managerial level. It also caters to working professionals aiming to upskill their security knowledge for strategic roles or career changers transitioning into the IT security industry. Strong analytical skills and an interest in technology, risk management, and regulatory compliance are beneficial prerequisites for this specialized MBA.
Why Choose This Course?
Graduates of this program can expect to secure roles such as Information Security Manager, Cyber Security Consultant, IT Risk Analyst, Security Architect, or GRC Specialist in India''''s leading IT firms, banks, and consultancies. Entry-level salaries typically range from INR 6-10 LPA, with experienced professionals earning significantly more. The program aligns with globally recognized certifications like CISSP, CISM, and CEH, providing a clear pathway for professional growth and leadership in the Indian cybersecurity landscape.

Student Success Practices
Foundation Stage
Build Strong IT & Business Fundamentals- (Semester 1-2)
Focus on mastering core subjects like Database Management Systems, Computer Networks, and Object-Oriented Programming (Java) while simultaneously understanding their business context through Managerial Economics and Management Accounting. Utilize online tutorials, practice coding, and solve business case studies regularly.
Tools & Resources
W3Schools, HackerRank, Coursera courses on databases and networking, Investopedia for financial concepts
Career Connection
A solid foundation in both IT technicalities and business principles is critical for understanding the holistic implications of security, paving the way for advanced specialization in Information Security Management.
Develop Analytical & Problem-Solving Skills- (Semester 1-2)
Actively participate in case studies, group discussions, and problem-solving exercises in subjects like Business Statistics and Design Thinking. Seek opportunities to analyze complex business scenarios and propose innovative, IT-driven solutions. Engage in critical thinking during class discussions.
Tools & Resources
Harvard Business Review case studies, LinkedIn Learning courses on critical thinking and data analysis, Basic analytics tools like Microsoft Excel
Career Connection
Information Security roles demand strong analytical capabilities to identify sophisticated threats, assess nuanced risks, and formulate effective, data-driven security strategies that protect organizational assets.
Engage in Peer Learning & Collaborative Projects- (Semester 1-2)
Form study groups to discuss complex topics, work on assignments collaboratively, and prepare for exams. Actively participate in mini-projects related to IT fundamentals to gain practical team-based experience and improve interpersonal skills essential for future managerial roles.
Tools & Resources
Google Workspace for collaboration, Academic forums and online communities, Campus clubs focused on technology or management
Career Connection
Teamwork, communication, and collaboration are indispensable skills in real-world cybersecurity incident response, cross-functional project implementation, and managing security teams effectively.
Intermediate Stage
Deep Dive into Specialization Electives- (Semester 3)
Beyond classroom lectures, explore practical applications of Information Security Fundamentals, Network Security, Cyber Security, and GRC concepts. Undertake personal projects simulating attacks, defenses, or compliance audits in controlled environments. Focus on understanding the real-world implications of security frameworks.
Tools & Resources
Kali Linux, Wireshark, Metasploit, Virtual labs (e.g., from TryHackMe, Hack The Box), Official documentation for ISO 27001, NIST
Career Connection
Hands-on experience with security tools, frameworks, and practical problem-solving directly translates to valuable skills required for specialized roles in cybersecurity, making you job-ready.
Pursue Foundational Industry Certifications- (Semester 3)
Begin preparing for globally recognized cybersecurity certifications such as CompTIA Security+, CEH (Certified Ethical Hacker) foundational modules, or CISA/CISM entry-level certifications. These certifications provide a structured learning path and validate essential skills, significantly boosting employability in the Indian market.
Tools & Resources
Official certification study guides, Practice exams from reputable providers, Online training platforms like Cybrary or Udemy, Professional cybersecurity communities
Career Connection
Certifications are often a mandatory requirement or a strong advantage for entry-level to mid-level cybersecurity positions in India, demonstrating a commitment to professional development and validated expertise.
Network with Industry Professionals & Apply Internship Learnings- (Semester 3)
Actively participate in industry events, webinars, and connect with cybersecurity professionals and SCIT alumni on LinkedIn. Leverage insights gained from your summer internship to understand real-world security challenges, current trends, and solutions, actively seeking mentorship opportunities and industry perspectives.
Tools & Resources
LinkedIn, Industry events calendars (e.g., DSCI, NASSCOM), SCIT alumni network portal, Professional meetups and conferences
Career Connection
Networking opens doors to potential job referrals, internship extensions, and staying updated with dynamic industry trends, directly enhancing your overall placement prospects and career trajectory.
Advanced Stage
Execute Strategic Specialization Projects & Dissertation- (Semester 4)
Choose a challenging, industry-relevant topic for your Project and Dissertation that applies advanced concepts from Cloud Security, Data Privacy, and IT Audit. Aim to develop a comprehensive solution or conduct in-depth research that addresses a critical, real-world cybersecurity problem, demonstrating depth of knowledge and strategic thinking.
Tools & Resources
Academic research databases (e.g., IEEE, ACM), Industry reports and whitepapers, Specialized security software for analysis, Dedicated faculty mentorship and guidance
Career Connection
High-quality projects and dissertations showcase your expertise, critical thinking, and problem-solving abilities to potential employers, positioning you for strategic and leadership roles in cybersecurity.
Attain Advanced Industry Certifications- (Semester 4)
Pursue highly respected advanced certifications like CISSP (Certified Information Systems Security Professional), CISM (Certified Information Security Manager), or CRISC (Certified in Risk and Information Systems Control) to solidify your expertise and stand out in the competitive job market. Plan these strategically around your placement cycle.
Tools & Resources
Official study guides and examination bodies (ISC2, ISACA), Online bootcamps and intensive training programs, Professional communities and peer study groups for advanced prep
Career Connection
These advanced certifications are globally recognized and highly valued for managerial, architect-level, and leadership cybersecurity roles, offering significant career acceleration and enhanced salary benefits in India and abroad.
Master Interview & Placement Strategies- (Semester 4)
Engage rigorously in mock interviews, resume refinement workshops, and group discussion practices with the career services department. Focus on articulating your cybersecurity knowledge, project experiences, and leadership skills clearly. Research target companies thoroughly, understanding their specific security needs and challenges.
Tools & Resources
SCIT Career Services Department, Interview preparation platforms (e.g., Glassdoor, InterviewBit, LeetCode for technical roles), Alumni mentors for company-specific insights
Career Connection
Effective and strategic placement preparation is paramount for securing desirable roles in top Indian and multinational companies upon graduation, ensuring a strong start to your professional cybersecurity career.
Program Structure and Curriculum
Eligibility:
- Graduate from any recognised University/ Institution of National Importance with minimum of 50% marks or equivalent grade (45% for Scheduled Castes/ Scheduled Tribes) at graduation level. Candidates must also have a valid SNAP score and clear the Group Exercise, Personal Interview, and Written Ability Test rounds.
Duration: 2 years (4 Semesters)
Credits: 92 Credits
Assessment: Internal: Not explicitly defined as fixed percentages; involves continuous internal assessment, assignments, presentations, case studies, guest lectures, and field visits., External: Not explicitly defined as fixed percentages; involves end-semester examinations.
Semester-wise Curriculum Table
Semester 1
| Subject Code | Subject Name | Subject Type | Credits | Key Topics |
|---|---|---|---|---|
| SCIT 01 | Business Statistics | Core | 2 | Data Collection and Presentation, Probability and Distributions, Hypothesis Testing, Regression and Correlation, Statistical Decision Making |
| SCIT 02 | Managerial Economics | Core | 2 | Demand and Supply Analysis, Production and Cost Theory, Market Structures and Pricing Strategies, Macroeconomic Concepts, Government Policies and Business |
| SCIT 03 | Fundamentals of Information Technology | Core | 2 | Hardware and Software Concepts, Operating Systems Basics, Networking Fundamentals, Database Concepts, Emerging Technologies |
| SCIT 04 | Computer Networks | Core | 2 | OSI and TCP/IP Models, Network Topologies and Devices, IP Addressing and Subnetting, Routing and Switching, Network Protocols |
| SCIT 05 | Operating Systems | Core | 2 | Operating System Functions, Process Management, Memory Management, File Systems, Introduction to OS Security |
| SCIT 06 | Database Management Systems | Core | 2 | Relational Data Model, SQL Queries and Commands, Database Design and Normalization, Transaction Management, Database Security Concepts |
| SCIT 07 | Object Oriented Programming with Java | Core | 2 | OOP Concepts (Encapsulation, Inheritance, Polymorphism), Classes and Objects in Java, Exception Handling, Collections Framework, Introduction to Java Development |
| SCIT 08 | Management Accounting | Core | 2 | Cost Concepts and Classification, Budgeting and Variance Analysis, Financial Statement Analysis, Cost-Volume-Profit Analysis, Decision Making Techniques |
| SCIT 09 | Organisational Behavior | Core | 2 | Individual Behavior (Perception, Motivation, Personality), Group Dynamics and Teamwork, Leadership Theories, Organizational Culture and Structure, Conflict Management |
| SCIT 10 | Design Thinking | Core | 2 | Introduction to Design Thinking Process, Empathize and Define Stages, Ideation Techniques, Prototyping and Testing, Innovation and User-Centric Design |
Semester 2
| Subject Code | Subject Name | Subject Type | Credits | Key Topics |
|---|---|---|---|---|
| SCIT 11 | Financial Management | Core | 2 | Capital Budgeting, Working Capital Management, Sources of Finance, Cost of Capital, Risk and Return Analysis |
| SCIT 12 | Marketing Management | Core | 2 | Market Research and Segmentation, Product Life Cycle, Pricing Strategies, Promotion and Distribution Channels, Digital Marketing Fundamentals |
| SCIT 13 | Human Resource Management | Core | 2 | HR Planning and Recruitment, Training and Development, Performance Management, Compensation and Benefits, Employee Relations |
| SCIT 14 | Business Intelligence | Core | 2 | Data Warehousing Concepts, Data Mining Techniques, OLAP and Reporting Tools, Data Visualization, Decision Support Systems |
| SCIT 15 | System Analysis & Design | Core | 2 | System Development Life Cycle (SDLC), Requirements Gathering and Analysis, System Design Methodologies, UML Modeling, System Implementation and Testing |
| SCIT 16 | IT Infrastructure Management | Core | 2 | Data Center Management, Network Infrastructure Planning, Server and Storage Management, Virtualization Technologies, Cloud Computing Basics |
| SCIT 17 | Software Engineering | Core | 2 | Software Development Life Cycle Models, Requirements Engineering, Software Design Principles, Software Testing and Quality Assurance, Project Management in Software Development |
| SCIT 18 | Digital Business | Core | 2 | E-commerce Models and Strategies, Digital Marketing Channels, Social Media Business, Mobile Commerce, Digital Transformation |
| SCIT 19 | Business Research Methods | Core | 2 | Research Design and Problem Formulation, Data Collection Methods, Sampling Techniques, Data Analysis and Interpretation, Report Writing and Presentation |
| SCIT 20 | Enterprise Resource Planning | Core | 2 | Introduction to ERP Systems, ERP Modules and Functionalities, ERP Implementation Challenges, Supply Chain Management Integration, Customer Relationship Management |
| SCIT 21 | Summer Internship | Project | 4 | Industry Exposure and Application of Knowledge, Project Planning and Execution, Problem Solving in Real-world Scenarios, Report Writing and Presentation, Professional Networking |
Semester 3
| Subject Code | Subject Name | Subject Type | Credits | Key Topics |
|---|---|---|---|---|
| SCIT 22 | Information Security Fundamentals | Elective | 4 | CIA Triad and Security Principles, Threats, Vulnerabilities, and Risks, Access Control Mechanisms, Security Architecture and Models, Security Policies and Procedures |
| SCIT 23 | Network Security | Elective | 4 | Firewalls and Intrusion Detection Systems, Virtual Private Networks (VPNs), Cryptography and Public Key Infrastructure, Wireless Network Security, Secure Network Design |
| SCIT 24 | Cyber Security and Incident Management | Elective | 4 | Types of Cyber Attacks (Malware, Phishing, DoS), Cyber Threat Intelligence, Incident Response Lifecycle, Digital Forensics Fundamentals, Security Information and Event Management (SIEM) |
| SCIT 25 | Security Governance, Risk, and Compliance | Elective | 4 | GRC Frameworks and Standards (ISO 27001, NIST), Information Risk Management, Regulatory Compliance (GDPR, HIPAA, Indian IT Act), Security Audit and Assessment, Legal and Ethical Aspects of Security |
Semester 4
| Subject Code | Subject Name | Subject Type | Credits | Key Topics |
|---|---|---|---|---|
| SCIT 26 | Cloud Security | Elective | 4 | Cloud Service Models (IaaS, PaaS, SaaS), Cloud Security Architecture, Data Security in Cloud Environments, Identity and Access Management in Cloud, Cloud Compliance and Governance |
| SCIT 27 | Data Privacy and Protection | Elective | 4 | Data Protection Laws and Regulations (DPDP Act, GDPR), Privacy Principles and Frameworks, Data Masking and Encryption, Privacy Impact Assessment (PIA), Privacy by Design and Default |
| SCIT 28 | IT Audit and Assurance | Elective | 4 | IT Audit Planning and Management, Control Objectives and Frameworks (COBIT), IT Audit Methodologies, Audit Tools and Techniques, Reporting and Follow-up |
| SCIT 29 | Business Continuity & Disaster Recovery | Elective | 4 | Business Impact Analysis (BIA), Risk Assessment for BCP/DRP, Disaster Recovery Planning Strategies, Business Continuity Management (BCM), Testing and Maintenance of BCP/DRP |
| SCIT 30 | Project | Project | 8 | Problem Identification and Definition, Research Methodology, Data Analysis and Solution Design, Implementation and Testing, Project Report and Presentation |
| SCIT 31 | Dissertation | Project | 8 | Formulating Research Questions, Literature Review, Data Collection and Methodology, Statistical and Qualitative Analysis, Thesis Writing and Defense |




